Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
How To Set Up A Wireless Network Using A D-Link Wireless Router
Layered Security Solutions - Simplified © 2008 Monte Robertson - CEO Layered Security Solutions – Simplified!
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
For further information computersecurity.wlu.ca
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Information and Technology Services Customer Services.
Internet, Intranet and Extranets
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Configuring your Home Network Configuring your Home Network Jay Ferron ADMT, CISM, CISSP, MCDBA, MCSE, MCT, NSA-IAM.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Simple ways to secure Wireless Computers Jay Ferron, ADMT, CISM, CISSP, MCSE, MCSBA, MCT, NSA-IAM, TCI.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Wireless LANs A Case Study of Baylor University’s Wireless Network Copyright Bob Hartland 2002 This work is the intellectual property of the author. Permission.
Netop Remote Control Trusted. Secure. Experienced.
Computer Networks IGCSE ICT Section 4.
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Desktop in the Clouds Using Virtualization to Extend Client Outreach and Protect Data.
Penn State University College Of Education Understanding College of Education Resources.
Desktop 1 Owning the Desktop: Is.edu like.com? Scott Bradner Harvard University University Technology Security Officer 28 June 2006.
User Services. Services Desktop Support Technical Support Help Desk User Services Customer Relationship Management.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Introduction to ITS SU. What we will cover ? Why it is important to you ? Netid account Printing SUmail Public Labs SURA/VPN AirOrangeX Getting.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Supporting BYOD Dennis Cromwell Supporting BYOD  CISCO Study – 15B devices capable of connecting to a network by 2015  The Consumerization.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Wireless Security: Protect yourself when you’re mobile.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
70-411: Administering Windows Server 2012
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
University Health Care Computer Systems Fellows, Residents, & Interns.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Our Company What your are Getting If your workstation or laptop has been giving you problems, we can fix it and restore your productivity without adding.
Module 11: Designing Security for Network Perimeters.
April 28, A shared commitment to provide the most effective education to all students so they live successful lives. In order to accomplish the.
Introduction TO Network Administration
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Lesson 7 Networks Unit 1—Computer Basics. Computer Concepts BASICS - 2 Objectives Describe the benefits and disadvantages of networks. List and describe.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Mobile Device Security Management Leyna Belinsky.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Chapter 7. Identifying Assets and Activities to Be Protected
Self-service enrollment for Windows desktops
How To Set Up A Wireless Network
Cisco Express Foundation for Systems Engineers Exam Name : practice-questions.html.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 27: Network Operating Systems
ONE® Mail Training Presentation
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
Home Security in the Age of Broadband
Presentation transcript:

Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access

What We Will Cover Today What is mobile computing and who is doing it? What are the questions and strategies used we used to support developing technology? How did we know it was time to start supporting mobile users? We will not cover –BlackBerry Enterprise Server (BES), Good Link, Citrix, imaged computers What is mobile computing and who is doing it? What are the questions and strategies used we used to support developing technology? How did we know it was time to start supporting mobile users? We will not cover –BlackBerry Enterprise Server (BES), Good Link, Citrix, imaged computers

Definition of a Mobile Client Anyone who leaves their main office and expects network computing support Examples are: –Telecommuters (home computer) –Roaming users (laptops in Yale buildings) –Library and cafes –Traveling (laptops, smart phones, PDAs) –Satellite offices and clinics (desktops, laptops, smart phones, PDAs) Anyone who leaves their main office and expects network computing support Examples are: –Telecommuters (home computer) –Roaming users (laptops in Yale buildings) –Library and cafes –Traveling (laptops, smart phones, PDAs) –Satellite offices and clinics (desktops, laptops, smart phones, PDAs)

Support Challenges for Mobile Clients 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Support Challenges for Mobile Clients Listen Limit Train Listen Limit Train 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Listen Make the technology available to your IT people Facilitate and create a user group that are responsible for the devices Listen to your clients: monitor Help Desk calls, listen to anecdotal, hallway conversations, look for trends Make the technology available to your IT people Facilitate and create a user group that are responsible for the devices Listen to your clients: monitor Help Desk calls, listen to anecdotal, hallway conversations, look for trends 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? As a direct result of listening to our clients, we expanded Help Desk hours.

Limit Service Level Agreement (SLA) Be specific on what you can support and your limitations Non-Yale user names and passwords Use of non-ITS recommended hardware or OS Initial setup of internet access Special ISP configuration/information Call duration Service Level Agreement (SLA) Be specific on what you can support and your limitations Non-Yale user names and passwords Use of non-ITS recommended hardware or OS Initial setup of internet access Special ISP configuration/information Call duration 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Service Level Agreement (SLA) 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? Published at our web site

Sample Home Set-Up Network 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Training for staff - Boot Camp Sample question from Boot Camp training for new employees. 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? Which answer does not apply before starting the Linksys router configuration setup? a.The computers have internet access with the current setup i.e. DSL/cable modem b.The wired/wireless networking cards are installed in each computer that will connect to the router. c.Power cycle the router d.Any special configuration instructions / information from your ISP

Training for staff Attend conventions, classes and trades shows. Learn from each other. Use support staff’s home setups to help with testing. Train your clients to use recommended products. Document installation, configuration and troubleshooting guidelines for new services. Documentation is updated by staff either on a schedule or as needed. Attend conventions, classes and trades shows. Learn from each other. Use support staff’s home setups to help with testing. Train your clients to use recommended products. Document installation, configuration and troubleshooting guidelines for new services. Documentation is updated by staff either on a schedule or as needed. 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Training for staff Documentation Wireless Security Screen Security settings and WPA/Pre-Shared Key Encryption Methods Advanced Encryption Standard (AES) Documentation Wireless Security Screen Security settings and WPA/Pre-Shared Key Encryption Methods Advanced Encryption Standard (AES) 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Training for staff 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? New computer lab

Training for staff 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? New computer lab with web cam

Support Challenges for Mobile Clients How do we secure a device that is not in our “controlled” environment and has the possibility of multiple users including spouses and children? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Security is a Snap! … Also see: Security Announcements ITpartners-list Archives How to Prevent Problems Best practice & HIPAA requirements Safe Computing: Clear Advice Personal Firewall Protection and VPN Identity Theft || Phishing PDA security Wireless security Remote Access and Windows Networking Virus/Malware information … 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

How do we keep a computer secure? Solutions are: Best Practices –Self help –Patch management –Antivirus –SSL –VPN for wireless and home System and Networking Policies –Lost devices –Encryption –Limited enforcement but consequences Use HIPAA security rule to set best practices Solutions are: Best Practices –Self help –Patch management –Antivirus –SSL –VPN for wireless and home System and Networking Policies –Lost devices –Encryption –Limited enforcement but consequences Use HIPAA security rule to set best practices 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Collaboration 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? To be successful and offer quality support, departments need to partner and collaborate (i.e. sharing resources and knowledge).

Collaboration Telecom –First point of contact Security –VPN, remote desktop, SSL, anti-virus Library –Student needs, medical and reference software –Proxy services electronic journals Law School, School of Management, Central IT –Keep support consistent/leverage resources Inside our own support organization –Help Desk, Desktop Support, Walk-in Telecom –First point of contact Security –VPN, remote desktop, SSL, anti-virus Library –Student needs, medical and reference software –Proxy services electronic journals Law School, School of Management, Central IT –Keep support consistent/leverage resources Inside our own support organization –Help Desk, Desktop Support, Walk-in 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Collaborating with other departments Level of Support Time and Effort Cost No Support, against policy One device for all problems A method for each need Anything, anywhere 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Support Challenges for Mobile Clients Buying a laptop is not the only way to stay connected 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Stay connected best methods Kiosk – , meetings, contacts, task list Remote Desktop –Difficult to setup and stay synchronized –Any laptop will work Laptop Mobile technologies –PDA –Smart phones Kiosk – , meetings, contacts, task list Remote Desktop –Difficult to setup and stay synchronized –Any laptop will work Laptop Mobile technologies –PDA –Smart phones 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

Reasons for getting a PDA 1.You need to check and briefly respond to your when traveling 2.To briefly record simple messages, or access simple notes 3.Check and make appointments 4.Pocket Medical Reference guides 5.Filling out small forms electronically (usually requires custom coding) 1.You need to check and briefly respond to your when traveling 2.To briefly record simple messages, or access simple notes 3.Check and make appointments 4.Pocket Medical Reference guides 5.Filling out small forms electronically (usually requires custom coding) 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected? 1.How do we adapt to change in technology? 2.How do we keep a computer secure? 3.How do we collaborate with other departments? 4.What is the best method to stay connected?

What is still left to do International travelers Managing devices at home Can our support staff make home visits? Boot Camp into Training Management System International travelers Managing devices at home Can our support staff make home visits? Boot Camp into Training Management System

Conclusions with lessons learned It takes consistent effort to maintain. With new services, you should start small and expand gradually. Have a vision for how you will provide support for mobile users. Provide policies and guidance as we are already doing this support. Don’t let fear or denial motivate your decision. Work with the Telecom or the procurement department to agree on one cell phone service provider. It takes consistent effort to maintain. With new services, you should start small and expand gradually. Have a vision for how you will provide support for mobile users. Provide policies and guidance as we are already doing this support. Don’t let fear or denial motivate your decision. Work with the Telecom or the procurement department to agree on one cell phone service provider.

Resource List Library PDA applications Standard System and Network Security Hardware/Software and Configurations General Hardware Recommendations Service Level Agreement Library PDA applications Standard System and Network Security Hardware/Software and Configurations General Hardware Recommendations Service Level Agreement Specific technology Samsung i730, Treo 650, Blackberry 7250, Lynksys Netgear, Cisco VPN 4.7 Cisco Concentrator 3000 Remote Desktop Windows, VNC for Mac

Supporting The Mobile Client: Expanding Our Borders Q & A